mersenneforum.org  

Go Back   mersenneforum.org > Extra Stuff > Hobbies

Reply
 
Thread Tools
Old 2018-08-10, 16:57   #12
CRGreathouse
 
CRGreathouse's Avatar
 
Aug 2006

16EF16 Posts
Default

If you dabble in crypto, dabble because it's fun, not because you'll make your communications more secure. The moment you convince yourself you're more secure is the moment you act like you're more secure and that's when things start to go wrong.
CRGreathouse is offline   Reply With Quote
Old 2018-08-10, 18:56   #13
VictordeHolland
 
VictordeHolland's Avatar
 
"Victor de Hollander"
Aug 2011
the Netherlands

117610 Posts
Default Thanks, Bitlocker it is

Thanks for all the replies. I've installed (actually enabled) Bitlocker on the machine in question. It was very easy;
- edit/enable a group policy
- enable Bitlocker on the disk (in explorer.exe) and choose the security algorithm (I choose AES-XTS)
- reboot
- diskencryption was done in the background (took a couple of hours)

I've NOT send/uploaded the recovery key to my Microsoft account, but choose to print it instead and put it in a safe place.

I've not felt any real life performance impacts so far (the processor supports AES instructions).

@NSA, nothing to see here

Last fiddled with by VictordeHolland on 2018-08-10 at 18:56 Reason: extre newlines
VictordeHolland is offline   Reply With Quote
Old 2018-08-10, 20:03   #14
xilman
Bamboozled!
 
xilman's Avatar
 
May 2003
Down not across

27DA16 Posts
Default

Quote:
Originally Posted by M344587487 View Post
True, but at the same time security through obscurity isn't the worst idea as a last mile step for personal use only.
No,it's not the worst. It is marginally better than posting the cleartext on a public forum, such as Gmail's servers.

Writing your own crypto is a mugs game. If you are truly in a position where AES with appropriate key management is not secure enough, you have much bigger problems than crypto to think about. There are many many cheaper ways of breaking security than cracking AES. Search terms include "rubber hose", "svelte blonde", "checkbook" (and many more) each followed by "cryptanalysis".

Last fiddled with by xilman on 2018-08-10 at 20:04
xilman is online now   Reply With Quote
Old 2018-08-12, 12:59   #15
Xyzzy
 
Xyzzy's Avatar
 
"Mike"
Aug 2002

2·13·293 Posts
Default

538

PS - We now have xkcd BB code tags!

Xyzzy is offline   Reply With Quote
Old 2018-08-12, 13:42   #16
M344587487
 
M344587487's Avatar
 
"Composite as Heck"
Oct 2017

5×112 Posts
Default

Quote:
Originally Posted by xilman View Post
No,it's not the worst. It is marginally better than posting the cleartext on a public forum, such as Gmail's servers.

Writing your own crypto is a mugs game. If you are truly in a position where AES with appropriate key management is not secure enough, you have much bigger problems than crypto to think about. There are many many cheaper ways of breaking security than cracking AES. Search terms include "rubber hose", "svelte blonde", "checkbook" (and many more) each followed by "cryptanalysis".
My post gave plenty of context that custom steps are just for fun and should be behind normal encryption if you want to try them. There's no need for the standard boilerplate.
M344587487 is offline   Reply With Quote
Old 2019-03-03, 01:50   #17
dcheuk
 
dcheuk's Avatar
 
Jan 2019
Pittsburgh, PA

3×7×11 Posts
Default

Quote:
Originally Posted by retina View Post
I would suggest TrueCrypt's successor VeraCrypt.
  • It is open source.
  • It is honest about what it does and does not protect.
  • It does not send any "recovery key" to anyone (unlike BitLocker which sends the master key to MS).
  • It is also cross platform in that the partition format is public and they can be opened in Linux and Windows clients, so you don't have to have a valid Windows license to recover the data.
  • The master key is not tied to the system, since it doesn't use the TPM, so the data can be opened in any system (with the correct passphrase of course).
  • It also has cypher cascading so if any one cypher is broken or backdoored it can have another one, or two, cyphers in cascade still protecting the data.

Edit: You can have multiple passphrases to the same data by exchanging the header. So if someone forgets a passphrase you can replace the header with a backup.
This! I have been trying to find a encryption software that works similar to .dmg w/ passcode (i.e. can be mounted as a virtual drive and can be modified on the fly) that works across different OS. Thank you!

My apologies for poking at an old thread, but I cannot find the answer to a question after searching, and this seems to be the closest thread to post this on.

So, if I am to enable Bitlocker (whole disk encryption) on Windows or FileValue on Mac, how does it affect the GIMPS p95 speed. Does it decrease the throughput significantly on i.e. LL test?
dcheuk is offline   Reply With Quote
Reply

Thread Tools


Similar Threads
Thread Thread Starter Forum Replies Last Post
Laymans explanation of RSA encryption Fusion_power Programming 3 2013-11-04 20:50
Encryption and governments retina Soap Box 119 2012-02-28 05:00
A good encryption ? science_man_88 Soap Box 14 2010-10-14 18:31
Interesting Encryption problem FDCmercs Math 0 2007-01-07 15:50
No disk writing Max Software 22 2006-10-27 21:26

All times are UTC. The time now is 14:56.

Sat Aug 15 14:56:15 UTC 2020 up 2 days, 11:31, 1 user, load averages: 2.07, 1.85, 1.78

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2020, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.